Wonderland

image

Penetration Testing Methodology

Reconnaissance

  • nmap

Enumeration

  • Directory Bruteforce using dirbuster & Gobuster

Exploitation

Privilege Escalation

Capturing the flag

  • user.txt

  • root.txt


Walkthrough - There is so many rabbit hole. Watch out.

  1. nmap - to find open port

  1. enumerate directory (Gobuster // Dirbuster)

or

-> We can use any Gobuster or Dirbuster. But for this machine I recommend use dirbuster. It will make your task easier.

First

image

Second

image

Third

image

Fourth

image

Fifth

image

Sixth

image

Seventh

image
  1. ssh

Oops, there is root.txt. But we can't opened it.

image

Here, where the hint is really useful.

image

okay then we try a usual place for root.txt.

image

Well, that was an easy guess I think.

By AdaniKamal

Last updated